必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Bangkok

省份(region): Bangkok

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       128.1.0.0 - 128.1.255.255
CIDR:           128.1.0.0/16
NetName:        ZL-LAX3-003
NetHandle:      NET-128-1-0-0-1
Parent:         NET128 (NET-128-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Zenlayer Inc (ZENLA-7)
RegDate:        2016-09-07
Updated:        2018-01-12
Ref:            https://rdap.arin.net/registry/ip/128.1.0.0


OrgName:        Zenlayer Inc
OrgId:          ZENLA-7
Address:        21680 Gateway Center Dr. Suite 350
City:           Diamond Bar
StateProv:      CA
PostalCode:     91765
Country:        US
RegDate:        2017-12-27
Updated:        2025-09-04
Ref:            https://rdap.arin.net/registry/entity/ZENLA-7


OrgTechHandle: IPNOC27-ARIN
OrgTechName:   IPNOC
OrgTechPhone:  +1-800-858-7986 
OrgTechEmail:  ipnoc-t3@zenlayer.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPNOC27-ARIN

OrgTechHandle: TANGR16-ARIN
OrgTechName:   Tang, Ruifan 
OrgTechPhone:  +1-800-858-7986 
OrgTechEmail:  ruifan.tang@zenlayer.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TANGR16-ARIN

OrgAbuseHandle: SOCOP-ARIN
OrgAbuseName:   SOC Ops
OrgAbusePhone:  +1-909-718-3558 
OrgAbuseEmail:  abuse@zenlayer.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SOCOP-ARIN

OrgNOCHandle: IPNOC27-ARIN
OrgNOCName:   IPNOC
OrgNOCPhone:  +1-800-858-7986 
OrgNOCEmail:  ipnoc-t3@zenlayer.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/IPNOC27-ARIN

OrgNOCHandle: IPADM641-ARIN
OrgNOCName:   IP ADMIN
OrgNOCPhone:  +1-909-718-3558 
OrgNOCEmail:  ipadmin@zenlayer.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/IPADM641-ARIN

OrgTechHandle: IPADM641-ARIN
OrgTechName:   IP ADMIN
OrgTechPhone:  +1-909-718-3558 
OrgTechEmail:  ipadmin@zenlayer.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPADM641-ARIN

# end


# start

NetRange:       128.1.44.0 - 128.1.44.255
CIDR:           128.1.44.0/24
NetName:        ZL-BKK-UCLOUD-0034
NetHandle:      NET-128-1-44-0-1
Parent:         ZL-LAX3-003 (NET-128-1-0-0-1)
NetType:        Reassigned
OriginAS:       
Organization:   UCLOUD (UCLOU-1)
RegDate:        2019-03-28
Updated:        2019-03-28
Comment:        Abuse please contact:unoc@ucloud.cn ,unom@ucloud.cn,hegui@ucloud.cn
Ref:            https://rdap.arin.net/registry/ip/128.1.44.0


OrgName:        UCLOUD
OrgId:          UCLOU-1
Address:        FLAT/RM 603 6/   FLAWS COMMERCIAL PLAZA 788 CHEUNG SHA WAN ROAD  KL
City:           Hong Kong
StateProv:      
PostalCode:     
Country:        HK
RegDate:        2019-02-28
Updated:        2019-02-28
Ref:            https://rdap.arin.net/registry/entity/UCLOU-1


OrgAbuseHandle: IAU2-ARIN
OrgAbuseName:   IP ABUSE Ucloud
OrgAbusePhone:  +86 17721465033 
OrgAbuseEmail:  unoc@ucloud.cn
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IAU2-ARIN

OrgTechHandle: IAU2-ARIN
OrgTechName:   IP ABUSE Ucloud
OrgTechPhone:  +86 17721465033 
OrgTechEmail:  unoc@ucloud.cn
OrgTechRef:    https://rdap.arin.net/registry/entity/IAU2-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.1.44.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53982
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;128.1.44.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120201 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 03 04:00:32 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 106.44.1.128.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.44.1.128.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.73.51.249 attack
2020-02-05 1izT4G-0000qE-0Y H=candid.impitsol.com \(candid.armaghanbasir.co\) \[134.73.51.249\] rejected **REMOVED** : REJECTED - You seem to be a spammer!
2020-02-05 1izT5P-0000qF-38 H=candid.impitsol.com \(candid.armaghanbasir.co\) \[134.73.51.249\] rejected **REMOVED** : REJECTED - You seem to be a spammer!
2020-02-05 1izT74-0000qU-2f H=candid.impitsol.com \(candid.armaghanbasir.co\) \[134.73.51.249\] rejected **REMOVED** : REJECTED - You seem to be a spammer!
2020-02-06 07:21:08
51.38.99.123 attack
Feb  5 13:15:56 auw2 sshd\[12842\]: Invalid user ecf from 51.38.99.123
Feb  5 13:15:56 auw2 sshd\[12842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.ip-51-38-99.eu
Feb  5 13:15:58 auw2 sshd\[12842\]: Failed password for invalid user ecf from 51.38.99.123 port 33626 ssh2
Feb  5 13:18:42 auw2 sshd\[13129\]: Invalid user unk from 51.38.99.123
Feb  5 13:18:42 auw2 sshd\[13129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.ip-51-38-99.eu
2020-02-06 07:20:42
222.186.30.57 attack
02/05/2020-18:04:56.421575 222.186.30.57 Protocol: 6 ET SCAN Potential SSH Scan
2020-02-06 07:11:11
175.5.138.39 attackbotsspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-02-06 07:26:33
222.186.30.187 attackspambots
Feb  5 23:31:57 localhost sshd\[1591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.187  user=root
Feb  5 23:31:59 localhost sshd\[1591\]: Failed password for root from 222.186.30.187 port 36347 ssh2
Feb  5 23:32:01 localhost sshd\[1591\]: Failed password for root from 222.186.30.187 port 36347 ssh2
2020-02-06 06:46:58
49.88.112.112 attack
February 05 2020, 22:45:30 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban.
2020-02-06 06:58:41
23.94.153.186 attackspambots
Feb  5 23:27:47 h2177944 kernel: \[4139755.538851\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=23.94.153.186 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=31783 PROTO=TCP SPT=56243 DPT=26816 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  5 23:27:47 h2177944 kernel: \[4139755.538866\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=23.94.153.186 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=31783 PROTO=TCP SPT=56243 DPT=26816 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  5 23:29:59 h2177944 kernel: \[4139887.726202\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=23.94.153.186 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=50352 PROTO=TCP SPT=56243 DPT=26300 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  5 23:29:59 h2177944 kernel: \[4139887.726217\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=23.94.153.186 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=50352 PROTO=TCP SPT=56243 DPT=26300 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  5 23:35:54 h2177944 kernel: \[4140242.522378\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=23.94.153.186 DST=85.214.1
2020-02-06 06:57:16
213.34.208.90 attack
20/2/5@17:25:34: FAIL: Alarm-Network address from=213.34.208.90
...
2020-02-06 07:24:54
187.16.96.37 attackbots
Feb  5 12:25:18 sachi sshd\[23752\]: Invalid user xzt from 187.16.96.37
Feb  5 12:25:18 sachi sshd\[23752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mvx-187-16-96-37.mundivox.com
Feb  5 12:25:20 sachi sshd\[23752\]: Failed password for invalid user xzt from 187.16.96.37 port 43178 ssh2
Feb  5 12:26:13 sachi sshd\[23842\]: Invalid user oli from 187.16.96.37
Feb  5 12:26:13 sachi sshd\[23842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mvx-187-16-96-37.mundivox.com
2020-02-06 06:49:00
222.186.180.142 attack
Feb  5 17:35:26 plusreed sshd[27092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
Feb  5 17:35:28 plusreed sshd[27092]: Failed password for root from 222.186.180.142 port 26498 ssh2
...
2020-02-06 06:46:29
58.213.46.110 attack
IMAP brute force
...
2020-02-06 07:27:29
112.85.42.181 attackbots
Feb  5 12:25:49 php1 sshd\[23751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
Feb  5 12:25:51 php1 sshd\[23751\]: Failed password for root from 112.85.42.181 port 37981 ssh2
Feb  5 12:25:55 php1 sshd\[23751\]: Failed password for root from 112.85.42.181 port 37981 ssh2
Feb  5 12:26:07 php1 sshd\[23791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
Feb  5 12:26:09 php1 sshd\[23791\]: Failed password for root from 112.85.42.181 port 10182 ssh2
2020-02-06 06:53:24
49.231.197.17 attackbotsspam
Feb  5 12:36:27 auw2 sshd\[8372\]: Invalid user tenille from 49.231.197.17
Feb  5 12:36:27 auw2 sshd\[8372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.231.197.17
Feb  5 12:36:29 auw2 sshd\[8372\]: Failed password for invalid user tenille from 49.231.197.17 port 53746 ssh2
Feb  5 12:40:02 auw2 sshd\[8838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.231.197.17  user=root
Feb  5 12:40:04 auw2 sshd\[8838\]: Failed password for root from 49.231.197.17 port 53154 ssh2
2020-02-06 07:23:49
150.109.40.134 attackbots
Feb  5 23:52:42 silence02 sshd[14082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.40.134
Feb  5 23:52:45 silence02 sshd[14082]: Failed password for invalid user ffh from 150.109.40.134 port 36008 ssh2
Feb  5 23:56:16 silence02 sshd[14407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.40.134
2020-02-06 07:07:47
179.189.48.38 attackbots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-02-06 07:15:23

最近上报的IP列表

14.205.104.200 97.149.179.88 97.149.179.248 97.149.179.27
98.94.64.78 44.212.70.191 159.75.166.146 35.172.190.251
180.153.236.246 157.245.247.18 128.14.226.191 17.246.19.56
17.246.19.157 190.149.90.177 10.3.3.87 180.153.236.27
180.153.236.171 10.40.202.209 38.157.254.107 192.168.7.162